security teams spend months planning pen tests but skip the stuff that actually gets exploited
been thinking about this after sitting through another pen test planning session
we spend weeks scoping the engagement, defining rules of engagement, scheduling around business operations, coordinating with different teams...
then the pen testers show up and immediately start looking for the flashy stuff that makes good reports
sql injection, xss, privilege escalation paths, network pivoting
meanwhile the actual breaches i've seen happen because:
* developer accidentally committed aws keys to a public repo
* someone used the same password for their github account and their company email
* a dependency got compromised and nobody noticed for months
* admin panel was left accessible without proper auth
the pen test might find some theoretical attack chain that requires five different vulnerabilities to chain together
but attackers just... find the leaked api key and use that
we've been tracking this while building security tooling - looking at what pen tests typically report vs what causes actual incidents. the overlap is surprisingly small
like pen tests are optimized for demonstrating technical skill rather than finding the boring stuff that actually matters
don't get me wrong, pen testing has value. but it feels like we've built this whole industry around simulating sophisticated attacks while the real ones are much more mundane
anyone else notice this gap between what security assessments focus on vs what actually causes problems in production?
how often do pen test findings match up with your team's actual security incidents?been thinking about this after sitting through another pen test planning session
we spend weeks scoping the engagement, defining rules of engagement, scheduling around business operations, coordinating with different teams...
then the pen testers show up and immediately start looking for the flashy stuff that makes good reports
sql injection, xss, privilege escalation paths, network pivoting
meanwhile the actual breaches i've seen happen because:
* developer accidentally committed aws keys to a public repo
* someone used the same password for their github account and their company email
* a dependency got compromised and nobody noticed for months
* admin panel was left accessible without proper auth
the pen test might find some theoretical attack chain that requires five different vulnerabilities to chain together
but attackers just... find the leaked api key and use that
we've been tracking this while building security tooling - looking at what pen tests typically report vs what causes actual incidents. the overlap is surprisingly small
like pen tests are optimized for demonstrating technical skill rather than finding the boring stuff that actually matters
don't get me wrong, pen testing has value. but it feels like we've built this whole industry around simulating sophisticated attacks while the real ones are much more mundane
anyone else notice this gap between what security assessments focus on vs what actually causes problems in production?
how often do pen test findings match up with your team's actual security incidents?